Apple QuickTime Multiple Vulnerabilities
Last Update Date:
9 Nov 2012 11:26
Release Date:
9 Nov 2012
4868
Views
RISK: High Risk
TYPE: Clients - Audio & Video
Multiple vulnerabilities have been identified in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.
- A boundary error when processing a PICT file can be exploited to cause a buffer overflow.
- An error when processing a PICT file can be exploited to corrupt memory.
- A use-after-free error exists in the plugin when handling "_qtactivex_" parameters within an HTML object.
- A boundary error when handling the transform attribute of "text3GTrack" elements can be exploited to cause a buffer overflow via a specially crafted TeXML file.
- Some errors when processing TeXML files can be exploited to cause a buffer overflows.
- A boundary error when handling certain MIME types within a plugin can be exploited to cause a buffer overflow.
- A use-after-free error exists in the ActiveX control when handling "Clear()" method.
- A boundary error when processing a Targa file can be exploited to cause a buffer overflow.
- A boundary error when processing the "rnet" box within MP4 files can be exploited to cause a buffer overflow.
Impact
- Remote Code Execution
System / Technologies affected
- Apple QuickTime 7.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 7.7.3.
Vulnerability Identifier
- CVE-2011-1374
- CVE-2012-3751
- CVE-2012-3752
- CVE-2012-3753
- CVE-2012-3754
- CVE-2012-3755
- CVE-2012-3756
- CVE-2012-3757
- CVE-2012-3758
Source
Related Link
Share with